Comment on “Cheating Prevention in Visual Cryptography”
From MaRDI portal
Publication:5372959
DOI10.1109/TIP.2012.2190082zbMath1373.94910OpenAlexW2108800451WikidataQ51404659 ScholiaQ51404659MaRDI QIDQ5372959
Du-Shiau Tsai, Gwoboa Horng, Yu-Chi Chen
Publication date: 27 October 2017
Published in: IEEE Transactions on Image Processing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1109/tip.2012.2190082
Cryptography (94A60) Image processing (compression, reconstruction, etc.) in information and communication theory (94A08) Authentication, digital signatures and secret sharing (94A62)
Related Items (4)
Hierarchical Visual Secret Sharing Scheme Using Steganography ⋮ Image cryptographic algorithm based on the Haar wavelet transform ⋮ Prevention of cheating in visual cryptography by using coherent patterns ⋮ New extended visual cryptography schemes with clearer shadow images
This page was built for publication: Comment on “Cheating Prevention in Visual Cryptography”